More wolves in sheeps clothing – rogue or suspect antispyware



(or for that matter, rogue or suspect antivirus.) What’s fascinating about this category is most of these products either use security vulnerabilities to get into a system, or merely convince a person browsing the web that they’re the right tool for the job. Kind of like virtual con-men in a sense…. Anyway… Spyware Confidential has a listing of the top 10 rogue/suspect antispyware programs. Some familiar names are mentioned…


It’s also worth checking out The Rogue/suspect antispyware page at spywarewarrior.com. Over there you’ll find over 200 entries. This includes some that have been delisted. Explanations for the listing/delisting are there too. In Suzi’s list… virtualbouncer/addestroyer get’s an Honorable mention (dishonorable mention?) – the top ten rogue’s are…
Spyware Bomber, Slimshield, WinAntivirus (and WinAntiSpyware2005), SPywareNo, Razespyware,Spy Trooper, WorldAntispy, PSGuard, SpySherriff, and finally, everyone’s favorite spyaxe…

For removal help she suggests visiting one of the reputable spyware help forums.

Related Posts

Blog Traffic Exchange Related Posts
  • How to Remove ReAnti | ReAnti Removal Guide ReAnti is a rogue antivirus application from the Wini family. It is typically promoted through supposed flash player updates or video codec updates. Once on your system it will pretend to run a scan and find all sorts of files that it claims are infected with viruses. Of course, like......
  • So who is behind Windows Police Pro Virus / Rogue Security Software? As I've seen the continuing FLOOD of searches for some way to Remove Windows Police Pro, I've been starting to wonder at the who is behind this particular piece of junk software. These programs aren't written by your average ordinary virus writer, there is really too much spit and polish......
  • Nugache the latest in bot-net technology... and why you should care about botnets... To show you where the threat with bot networks is going there's a story today on Nugache (Symantec summary) which is a bot that takes advantage of a number of clever tricks to avoid having the whole bot net shut down, allow command and control on an encrypted channel and......
Blog Traffic Exchange Related Websites
  • SecurityOrb’s Top 5 Cyber Security Threat Predictions for 2011 2010 was an attention-grabbing year in the information security industry.  We saw some interesting things such as Google alleged hack by China, Wikileaks and the issues with insider threat and hacktivism, Stuxnet advanced malware implementation and social networking site vulnerabilities as well as our share of zero-day attacks to name......
  • Budgeting While in School When you are a college student, you may think that planning out a budget is simply a waste of time, because why does a college student need a budget? No matter how young or old you are, having your own budget is vitally important, and this actually happens to be......
  • FAQ about computer security Q: The virus blocked the registry access and how to get rid of it?A: You can deal with like this: 1. Click on Start -> Run (or Start Search in Windows Vista). 2. Enter GPEdit.msc and then press Enter. 3. Navigate to the following location: User Configuration -> Administrative Templates......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site